Movatterモバイル変換


[0]ホーム

URL:


US20160366102A1 - Self-Configuring Key Management System For an Internet of Things Network - Google Patents

Self-Configuring Key Management System For an Internet of Things Network
Download PDF

Info

Publication number
US20160366102A1
US20160366102A1US14/968,125US201514968125AUS2016366102A1US 20160366102 A1US20160366102 A1US 20160366102A1US 201514968125 AUS201514968125 AUS 201514968125AUS 2016366102 A1US2016366102 A1US 2016366102A1
Authority
US
United States
Prior art keywords
domain
key management
storage medium
instructions
computer readable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/968,125
Other versions
US10469464B2 (en
Inventor
Ned M. Smith
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel CorpfiledCriticalIntel Corp
Priority to US14/968,125priorityCriticalpatent/US10469464B2/en
Assigned to INTEL CORPORATIONreassignmentINTEL CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SMITH, NED M
Assigned to INTEL CORPORATIONreassignmentINTEL CORPORATIONCORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION NUMBERS 62172893 AND 62195409 PREVIOUSLY RECORDED AT REEL: 037289 FRAME: 0147. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT.Assignors: SMITH, NED M.
Priority to CN201680026946.2Aprioritypatent/CN107637011B/en
Priority to PCT/US2016/035282prioritypatent/WO2016200659A1/en
Priority to EP16808051.3Aprioritypatent/EP3308497B1/en
Publication of US20160366102A1publicationCriticalpatent/US20160366102A1/en
Application grantedgrantedCritical
Publication of US10469464B2publicationCriticalpatent/US10469464B2/en
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

In one embodiment, a method includes receiving, in a first device, at least one of a first symmetric key and a first asymmetric key in a common key management structure, the common key management structure to accommodate asymmetric keys and symmetric keys, and further including security policy information to enable communication between the first device of a first domain of an Internet of Things (IoT) network and a second device of a second domain of the IoT network according to an inter-domain security policy; and sending a first message directly from the first device to the second device according to the security policy information of the common key management structure. Other embodiments are described and claimed.

Description

Claims (24)

What is claimed is:
1. At least one computer readable storage medium comprising instructions that when executed enable a system to:
receive, in a first device, at least one of a first symmetric key and a first asymmetric key in a common key management structure, the common key management structure to accommodate asymmetric keys and symmetric keys, and further including security policy information to enable communication between the first device of a first domain of an Internet of Things (IoT) network and a second device of a second domain of the IoT network according to an inter-domain security policy; and
send a first message directly from the first device to the second device according to the security policy information of the common key management structure.
2. The at least one computer readable storage medium ofclaim 1, further comprising instructions that when executed enable the system to dynamically scale the IoT network by dynamically instantiating at least one zone controller for a first zone of the IoT network, the first zone including the first device.
3. The at least one computer readable storage medium ofclaim 1, further comprising instructions that when executed enable the system to dynamically scale the IoT network by dynamically instantiating at least one domain controller for the first domain, which includes the first device.
4. The at least one computer readable storage medium ofclaim 3, wherein the at least one domain controller comprises a key management system.
5. The at least one computer readable storage medium ofclaim 1, further comprising instructions that when executed enable the system to dynamically instantiate the first device as at least one of a domain controller for the first domain, a zone controller for a first zone of the first domain, and a client of the first domain.
6. The at least one computer readable storage medium ofclaim 1, further comprising instructions that when executed enable the first device to dynamically instantiate a third device as at least one of a zone controller of the first domain and a client of the first domain.
7. The at least one computer readable storage medium ofclaim 1, further comprising instructions that when executed enable the system to, in response to the first device receiving at an additional instance of the common key management structure, dynamically instantiate the first device as at least one of a domain controller for the first domain, a zone controller for a first zone of the first domain, and a client of the first domain.
8. The at least one computer readable storage medium ofclaim 1, further comprising instructions that when executed enable the system to:
for a first publication-subscription topic, dynamically instantiate the first device as at least one of a domain controller for the first domain, a zone controller for a first zone of the first domain, and a client of the first domain; and
for a second publication-subscription topic, dynamically instantiate the first device as at least one of a domain controller for at least one of the first domain and an additional domain, a zone controller for at least one of the first zone and an additional zone of the additional domain, and a client for at least one of the first domain and the additional domain.
9. The at least one computer readable storage medium ofclaim 1, further comprising instructions that when executed enable the system to:
receive a second message in the first device directly from the second device; and
enforce, in the first device, the inter-domain security policy with regard to the second message.
10. The at least one computer readable storage medium ofclaim 9, further comprising instructions that when executed enable the system to:
receive a third message in the first device directly from a third device; and
enforce, in the first device, an intra-domain security policy with regard to the third message;
wherein (a) the intra-domain and inter-domain policies are not equal to each other; and (b) the first and third devices, but not the second device, are included in a first domain.
11. The at least one computer readable storage medium ofclaim 10, wherein the inter-domain policy corresponds to at least one of data filtering, malware screening, and bandwidth reservations.
12. The at least one computer readable storage medium ofclaim 1, further comprising instructions that when executed enable the system to receive the common key management structure from a first zone controller, the first zone controller dynamically assigned a key management role from an initial key management system of the IoT network.
13. The at least one computer readable storage medium ofclaim 12, wherein the first zone controller and the first device are both included in the first domain, which does not include the second device.
14. The at least one computer readable storage medium ofclaim 1, further comprising instructions that when executed enable the system to:
encrypt, in the first device, the first message using the first symmetric key; and
send, directly from the first device to the second device, an additional instance of the first symmetric key;
wherein (a) the additional instance of the first symmetric key is encrypted based on keys shared between the second device and a third device but not the first device; and (b) the second and third devices are each included in the second domain, which does not include the first device.
15. The at least one computer readable storage medium ofclaim 14, wherein (a) the first domain is a logical collection of devices, including the first device, under a common administrative control administered by at least one of the collection of devices, and (b) a zone is a logical subset of the devices under a common administrative control administered by at least one of the subset of the devices.
16. The at least one computer readable storage medium ofclaim 1, further comprising instructions that when executed enable the system to receive the common key management structure from a key management system responsive to a request from the first device to interact with the second device.
17. The at least one computer readable storage medium ofclaim 1, further comprising instructions that when executed enable the system to cause the common key management structure to expire according to expiration information of the common key management structure, and thereafter prevent interaction between the first device and the second device.
18. The at least one computer readable storage medium ofclaim 1, further comprising instructions that when executed enable the system to:
receive, in the first device, the first symmetric key in the common key management structure included in a first communication; and
receive, in the first device, the first asymmetric key in the common key management structure included in a second communication.
19. The at least one computer readable storage medium ofclaim 18, wherein the first symmetric key corresponds to a first encryption protocol and the first asymmetric key corresponds to a second encryption protocol unequal to the first encryption protocol.
20. The at least one computer readable storage medium ofclaim 1, further comprising instructions that when executed enable the system to receive, in the first device, the first symmetric key and the first asymmetric key in the common key management structure.
21. The at least one computer readable storage medium ofclaim 1, further comprising instructions that when executed enable the system to:
receive, in the first device, the first asymmetric key in the common key management structure; and.
encrypt, in the first device, the first message using the first asymmetric key.
22. The at least one computer readable storage medium ofclaim 1, further comprising instructions that when executed enable the system to send the first message in a data portion of a second common key management structure.
23. A first device comprising:
at least one hardware processor to execute instructions;
at least one network interface to enable the at least one hardware processor to communicate with second and third computing nodes coupled in an Internet of Things (IoT);
at least one non-transitory storage medium having instructions stored thereon for causing the at least one hardware processor of the first device to:
receive at least one of a first symmetric key and a first asymmetric key in a common key management structure, the common key management structure to accommodate asymmetric keys and symmetric keys, wherein the common key management structure includes security policy information to enable communication between the first device of a first domain of an Internet of Things (IoT) network and a second device of a second domain of the IoT network according to an inter-domain security policy; and
send a first message directly to the second device according to the security policy information of the common key management structure.
24. The first device ofclaim 23, the at least one medium further comprising instructions that when executed enable the first device to dynamically instantiate at least one zone controller for a first zone of the IoT network, the first zone including the first device.
US14/968,1252015-06-092015-12-14Self-configuring key management system for an internet of things networkActive2037-11-28US10469464B2 (en)

Priority Applications (4)

Application NumberPriority DateFiling DateTitle
US14/968,125US10469464B2 (en)2015-06-092015-12-14Self-configuring key management system for an internet of things network
CN201680026946.2ACN107637011B (en)2015-06-092016-06-01Self-configuration key management system for internet of things network
PCT/US2016/035282WO2016200659A1 (en)2015-06-092016-06-01A self-configuring key management system for an internet of things network
EP16808051.3AEP3308497B1 (en)2015-06-092016-06-01A self-configuring key management system for an internet of things network

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US201562172893P2015-06-092015-06-09
US201562195409P2015-07-222015-07-22
US14/968,125US10469464B2 (en)2015-06-092015-12-14Self-configuring key management system for an internet of things network

Publications (2)

Publication NumberPublication Date
US20160366102A1true US20160366102A1 (en)2016-12-15
US10469464B2 US10469464B2 (en)2019-11-05

Family

ID=57504316

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US14/968,125Active2037-11-28US10469464B2 (en)2015-06-092015-12-14Self-configuring key management system for an internet of things network

Country Status (4)

CountryLink
US (1)US10469464B2 (en)
EP (1)EP3308497B1 (en)
CN (1)CN107637011B (en)
WO (1)WO2016200659A1 (en)

Cited By (34)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20170026185A1 (en)*2015-07-212017-01-26Entrust, Inc.Method and apparatus for providing secure communication among constrained devices
WO2019067002A1 (en)*2017-09-262019-04-04Olympus Sky Technologies, S.A.Secure communications using organically derived synchronized processes
US10412581B2 (en)*2017-02-142019-09-10Ford Global Technologies, LlcSecure session communication between a mobile device and a base station
US10516654B2 (en)*2016-03-152019-12-24Intel CorporationSystem, apparatus and method for key provisioning delegation
US10528725B2 (en)2016-11-042020-01-07Microsoft Technology Licensing, LlcIoT security service
US10574636B2 (en)2015-10-142020-02-25Mcafee, LlcSystem, apparatus and method for migrating a device having a platform group
US10579825B2 (en)*2017-03-172020-03-03Labyrinth Research LlcUnified control of privacy-impacting devices
US10687212B2 (en)2017-04-072020-06-16At&T Mobility Ii LlcMobile network core component for managing security keys
US20200213101A1 (en)*2018-02-122020-07-02Afero, Inc.System and method for securely configuring a new device with network credentials
US20200328885A1 (en)*2019-04-152020-10-15Smart Security Systems, LlcEnhanced monitoring and protection of enterprise data
US10936713B2 (en)*2015-12-172021-03-02The Charles Stark Draper Laboratory, Inc.Techniques for metadata processing
US10972456B2 (en)2016-11-042021-04-06Microsoft Technology Licensing, LlcIoT device authentication
US11025627B2 (en)*2017-07-102021-06-01Intel CorporationScalable and secure resource isolation and sharing for IoT networks
US20210184845A1 (en)*2019-12-162021-06-17Bull SasSecure, decentralized, automated platform and multi-actors for object identity management through the use of a block chain technology
US20210204128A1 (en)*2018-05-282021-07-01Carrier CorporationEnd user inclusion and access of devices
US11146643B2 (en)*2017-03-232021-10-12Ntt Communications CorporationMessage bus agent apparatus, signaling server, message bus management server, connection establishment method, and program
US11150910B2 (en)2018-02-022021-10-19The Charles Stark Draper Laboratory, Inc.Systems and methods for policy execution processing
US11182162B2 (en)2015-12-172021-11-23The Charles Stark Draper Laboratory, Inc.Techniques for metadata processing
US20220200973A1 (en)*2019-04-152022-06-23Bear System, LLCBlockchain schema for secure data transmission
US20220261469A1 (en)*2019-03-082022-08-18Master Lock Company LlcLocking device biometric access
US11588629B2 (en)*2019-12-162023-02-21Bull SasSecure, decentralized, automated platform and multi-actors for object identity management through the use of a block chain technology
WO2023116032A1 (en)*2021-12-212023-06-29中兴通讯股份有限公司Networking method and device based on short-distance communication, and storage medium
US11748457B2 (en)2018-02-022023-09-05Dover Microsystems, Inc.Systems and methods for policy linking and/or loading for secure initialization
US11797398B2 (en)2018-04-302023-10-24Dover Microsystems, Inc.Systems and methods for checking safety properties
US11841956B2 (en)2018-12-182023-12-12Dover Microsystems, Inc.Systems and methods for data lifecycle protection
US11875180B2 (en)2018-11-062024-01-16Dover Microsystems, Inc.Systems and methods for stalling host processor
US11928201B2 (en)*2016-12-222024-03-12Hid Global Cid SasMobile credential with online/offline delivery
US12079197B2 (en)2019-10-182024-09-03Dover Microsystems, Inc.Systems and methods for updating metadata
US12124576B2 (en)2020-12-232024-10-22Dover Microsystems, Inc.Systems and methods for policy violation processing
US12124566B2 (en)2018-11-122024-10-22Dover Microsystems, Inc.Systems and methods for metadata encoding
US12248564B2 (en)2018-02-022025-03-11Dover Microsystems, Inc.Systems and methods for transforming instructions for metadata processing
US12253944B2 (en)2020-03-032025-03-18Dover Microsystems, Inc.Systems and methods for caching metadata
US12393677B2 (en)2019-01-182025-08-19Dover Microsystems, Inc.Systems and methods for metadata classification
US12438883B2 (en)*2023-05-172025-10-07Microsoft Technology Licensing, LlcRegion-based security policies for cloud resources

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106936570B (en)*2015-12-312021-08-20华为技术有限公司 A key configuration method, key management center, and network element
CN110392014B (en)*2018-04-172022-08-05阿里巴巴集团控股有限公司 Communication method and device between IoT devices
US11108749B2 (en)*2019-03-252021-08-31Micron Technology, Inc.Secure device coupling
US11405414B2 (en)2019-08-062022-08-02Bank Of America CorporationAutomated threat assessment system for authorizing resource transfers between distributed IoT components
US11341485B2 (en)2019-08-062022-05-24Bank Of America CorporationMachine learning based system for authorization of autonomous resource transfers between distributed IOT components
US10921787B1 (en)2019-08-062021-02-16Bank Of America CorporationCentralized resource transfer engine for facilitating resource transfers between distributed internet-of-things (IoT) components
CN110519054A (en)*2019-08-292019-11-29四川普思科创信息技术有限公司A method of internet of things data safeguard protection is carried out based on reliable computing technology
CN113596013B (en)*2021-07-262024-02-09深圳Tcl新技术有限公司Method and device for setting device control authority, computer device and storage medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070192325A1 (en)*2006-02-012007-08-16Morris Robert PHTTP publish/subscribe communication protocol
US20080126794A1 (en)*2006-11-282008-05-29Jianxin WangTransparent proxy of encrypted sessions
US20080304669A1 (en)*2007-06-112008-12-11The Boeing CompanyRecipient-signed encryption certificates for a public key infrastructure
US20120011360A1 (en)*2010-06-142012-01-12Engels Daniel WKey management systems and methods for shared secret ciphers
US20120291089A1 (en)*2011-05-132012-11-15Raytheon CompanyMethod and system for cross-domain data security
US20130170499A1 (en)*2011-04-152013-07-04Architecture Technology, Inc.Border gateway broker, network and method
US20140241354A1 (en)*2013-02-252014-08-28Qualcomm IncorporatedEstablishing groups of internet of things (iot) devices and enabling communication among the groups of iot devices
US20150121066A1 (en)*2013-09-102015-04-30John A. NixSet of Servers for "Machine-to-Machine" Communications using Public Key Infrastructure
US20150121470A1 (en)*2013-10-252015-04-30Qualcomm IncorporatedPeer-to-peer onboarding of internet of things (iot) devices over various communication interfaces
US20150130957A1 (en)*2013-11-142015-05-14Qualcomm IncorporatedMethod and apparatus for identifying a physical iot device
US20160182459A1 (en)*2014-12-182016-06-23Afero, Inc.System and method for securely connecting network devices
US20160205097A1 (en)*2015-01-122016-07-14Verisign, Inc.Systems and methods for establishing ownership and delegation ownership of iot devices using domain name system services
US20160353305A1 (en)*2015-06-012016-12-01Kiban Labs, Inc.Internet of things (iot) automotive device, system, and method
US9780954B2 (en)*2014-02-032017-10-03Tata Consultancy Services Ltd.Computer implemented system and method for lightweight authentication on datagram transport for internet of things

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7546452B2 (en)*2002-08-202009-06-09Intel CorporationHardware-based credential management
US8364951B2 (en)*2002-12-302013-01-29General Instrument CorporationSystem for digital rights management using distributed provisioning and authentication
US20050213768A1 (en)*2004-03-242005-09-29Durham David MShared cryptographic key in networks with an embedded agent
WO2006117680A2 (en)*2005-02-252006-11-09Sap AgConsistent set of interfaces derived from a business object model
CN100488199C (en)*2005-08-232009-05-13北京无限新锐网络科技有限公司Media issuing system and method
US20070219914A1 (en)*2006-03-172007-09-20Moore Barrett HDocument-based civilly-catastrophic event personal action guide facilitation method
US7817986B2 (en)2006-04-282010-10-19Motorola, Inc.Method and system for providing cellular assisted secure communications of a plurality of ad hoc devices
CN101286845B (en)*2008-05-122011-02-09华中科技大学 A Role-Based Inter-Domain Access Control System
US8266433B1 (en)2009-04-302012-09-11Netapp, Inc.Method and system for automatically migrating encryption keys between key managers in a network storage system
CN102055585B (en)*2009-11-042012-12-19中兴通讯股份有限公司Media security lawful monitoring method and system based on key management server (KMS)
CN101715186B (en)*2009-11-202012-01-04西安电子科技大学Secret sharing based safety communication method of wireless sensor network
US8881236B2 (en)*2011-02-042014-11-04Futurewei Technologies, Inc.Method and apparatus for a control plane to manage domain-based security and mobility in an information centric network
CN103475624A (en)*2012-06-062013-12-25中兴通讯股份有限公司Internet of Things key management center system, key distribution system and method
IN2015DN00015A (en)2012-07-272015-05-22Ericsson Telefon Ab L M
US20140108558A1 (en)*2012-10-122014-04-17Citrix Systems, Inc.Application Management Framework for Secure Data Sharing in an Orchestration Framework for Connected Devices
CN103686717B (en)*2013-12-232016-09-07江苏物联网研究发展中心A kind of key management method of Internet of Things sensor-based system
CN103716415B (en)*2014-01-202017-08-22北京交通大学A kind of resource perception adaptation method with excellent extensibility

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070192325A1 (en)*2006-02-012007-08-16Morris Robert PHTTP publish/subscribe communication protocol
US20080126794A1 (en)*2006-11-282008-05-29Jianxin WangTransparent proxy of encrypted sessions
US20080304669A1 (en)*2007-06-112008-12-11The Boeing CompanyRecipient-signed encryption certificates for a public key infrastructure
US20120011360A1 (en)*2010-06-142012-01-12Engels Daniel WKey management systems and methods for shared secret ciphers
US20130170499A1 (en)*2011-04-152013-07-04Architecture Technology, Inc.Border gateway broker, network and method
US20120291089A1 (en)*2011-05-132012-11-15Raytheon CompanyMethod and system for cross-domain data security
US20140241354A1 (en)*2013-02-252014-08-28Qualcomm IncorporatedEstablishing groups of internet of things (iot) devices and enabling communication among the groups of iot devices
US20150121066A1 (en)*2013-09-102015-04-30John A. NixSet of Servers for "Machine-to-Machine" Communications using Public Key Infrastructure
US20150121470A1 (en)*2013-10-252015-04-30Qualcomm IncorporatedPeer-to-peer onboarding of internet of things (iot) devices over various communication interfaces
US20150130957A1 (en)*2013-11-142015-05-14Qualcomm IncorporatedMethod and apparatus for identifying a physical iot device
US9780954B2 (en)*2014-02-032017-10-03Tata Consultancy Services Ltd.Computer implemented system and method for lightweight authentication on datagram transport for internet of things
US20160182459A1 (en)*2014-12-182016-06-23Afero, Inc.System and method for securely connecting network devices
US20160205097A1 (en)*2015-01-122016-07-14Verisign, Inc.Systems and methods for establishing ownership and delegation ownership of iot devices using domain name system services
US20160353305A1 (en)*2015-06-012016-12-01Kiban Labs, Inc.Internet of things (iot) automotive device, system, and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Wang et al., Performance Evaluation of Attribute-Based Encryption: Toward Data Privacy in the IoT, August 2014, IEEE International Conference on Communications, pp. 725-730 (Year: 2014)*

Cited By (54)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10728043B2 (en)*2015-07-212020-07-28Entrust, Inc.Method and apparatus for providing secure communication among constrained devices
US11102013B2 (en)2015-07-212021-08-24Entrust, Inc.Method and apparatus for providing secure communication among constrained devices
US20170026185A1 (en)*2015-07-212017-01-26Entrust, Inc.Method and apparatus for providing secure communication among constrained devices
US10574636B2 (en)2015-10-142020-02-25Mcafee, LlcSystem, apparatus and method for migrating a device having a platform group
US11381396B2 (en)2015-10-142022-07-05Mcafee, LlcSystem, apparatus and method for migrating a device having a platform group
US11635960B2 (en)2015-12-172023-04-25The Charles Stark Draper Laboratory, Inc.Processing metadata, policies, and composite tags
US11340902B2 (en)2015-12-172022-05-24The Charles Stark Draper Laboratory, Inc.Techniques for metadata processing
US11182162B2 (en)2015-12-172021-11-23The Charles Stark Draper Laboratory, Inc.Techniques for metadata processing
US11782714B2 (en)2015-12-172023-10-10The Charles Stark Draper Laboratory, Inc.Metadata programmable tags
US11507373B2 (en)2015-12-172022-11-22The Charles Stark Draper Laboratory, Inc.Techniques for metadata processing
US10936713B2 (en)*2015-12-172021-03-02The Charles Stark Draper Laboratory, Inc.Techniques for metadata processing
US11720361B2 (en)2015-12-172023-08-08The Charles Stark Draper Laboratory, Inc.Techniques for metadata processing
US10516654B2 (en)*2016-03-152019-12-24Intel CorporationSystem, apparatus and method for key provisioning delegation
US10528725B2 (en)2016-11-042020-01-07Microsoft Technology Licensing, LlcIoT security service
US10972456B2 (en)2016-11-042021-04-06Microsoft Technology Licensing, LlcIoT device authentication
US11928201B2 (en)*2016-12-222024-03-12Hid Global Cid SasMobile credential with online/offline delivery
US10412581B2 (en)*2017-02-142019-09-10Ford Global Technologies, LlcSecure session communication between a mobile device and a base station
US10579825B2 (en)*2017-03-172020-03-03Labyrinth Research LlcUnified control of privacy-impacting devices
US11146643B2 (en)*2017-03-232021-10-12Ntt Communications CorporationMessage bus agent apparatus, signaling server, message bus management server, connection establishment method, and program
US11461478B2 (en)2017-04-072022-10-04At&T Mobility Ii LlcMobile network core component for managing security keys
US10687212B2 (en)2017-04-072020-06-16At&T Mobility Ii LlcMobile network core component for managing security keys
US11025627B2 (en)*2017-07-102021-06-01Intel CorporationScalable and secure resource isolation and sharing for IoT networks
WO2019067002A1 (en)*2017-09-262019-04-04Olympus Sky Technologies, S.A.Secure communications using organically derived synchronized processes
US12159143B2 (en)2018-02-022024-12-03The Charles Stark Draper LaboratorySystems and methods for policy execution processing
US12248564B2 (en)2018-02-022025-03-11Dover Microsystems, Inc.Systems and methods for transforming instructions for metadata processing
US11977613B2 (en)2018-02-022024-05-07Dover Microsystems, Inc.System and method for translating mapping policy into code
US11150910B2 (en)2018-02-022021-10-19The Charles Stark Draper Laboratory, Inc.Systems and methods for policy execution processing
US12242575B2 (en)2018-02-022025-03-04Dover Microsystems, Inc.Systems and methods for policy linking and/or loading for secure initialization
US11748457B2 (en)2018-02-022023-09-05Dover Microsystems, Inc.Systems and methods for policy linking and/or loading for secure initialization
US11709680B2 (en)2018-02-022023-07-25The Charles Stark Draper Laboratory, Inc.Systems and methods for policy execution processing
US20200213101A1 (en)*2018-02-122020-07-02Afero, Inc.System and method for securely configuring a new device with network credentials
US11626974B2 (en)*2018-02-122023-04-11Afero, Inc.System and method for securely configuring a new device with network credentials
US12373314B2 (en)2018-04-302025-07-29Dover Microsystems, Inc.Systems and methods for executing state machine in parallel with application code
US11797398B2 (en)2018-04-302023-10-24Dover Microsystems, Inc.Systems and methods for checking safety properties
US20210204128A1 (en)*2018-05-282021-07-01Carrier CorporationEnd user inclusion and access of devices
US11875180B2 (en)2018-11-062024-01-16Dover Microsystems, Inc.Systems and methods for stalling host processor
US12124566B2 (en)2018-11-122024-10-22Dover Microsystems, Inc.Systems and methods for metadata encoding
US11841956B2 (en)2018-12-182023-12-12Dover Microsystems, Inc.Systems and methods for data lifecycle protection
US12393677B2 (en)2019-01-182025-08-19Dover Microsystems, Inc.Systems and methods for metadata classification
US11947649B2 (en)*2019-03-082024-04-02Master Lock Company LlcLocking device biometric access
US20220261469A1 (en)*2019-03-082022-08-18Master Lock Company LlcLocking device biometric access
US20220200973A1 (en)*2019-04-152022-06-23Bear System, LLCBlockchain schema for secure data transmission
US20230043229A1 (en)*2019-04-152023-02-09Smart Security Systems, LlcEnhanced monitoring and protection of enterprise data
US11483143B2 (en)*2019-04-152022-10-25Smart Security Systems, LlcEnhanced monitoring and protection of enterprise data
US20230037520A1 (en)*2019-04-152023-02-09Smart Security Systems, LlcBlockchain schema for secure data transmission
US20200328885A1 (en)*2019-04-152020-10-15Smart Security Systems, LlcEnhanced monitoring and protection of enterprise data
US12079197B2 (en)2019-10-182024-09-03Dover Microsystems, Inc.Systems and methods for updating metadata
US11582034B2 (en)*2019-12-162023-02-14Bull SasSecure, decentralized, automated platform and multi-actors for object identity management through the use of a block chain technology
US20210184845A1 (en)*2019-12-162021-06-17Bull SasSecure, decentralized, automated platform and multi-actors for object identity management through the use of a block chain technology
US11588629B2 (en)*2019-12-162023-02-21Bull SasSecure, decentralized, automated platform and multi-actors for object identity management through the use of a block chain technology
US12253944B2 (en)2020-03-032025-03-18Dover Microsystems, Inc.Systems and methods for caching metadata
US12124576B2 (en)2020-12-232024-10-22Dover Microsystems, Inc.Systems and methods for policy violation processing
WO2023116032A1 (en)*2021-12-212023-06-29中兴通讯股份有限公司Networking method and device based on short-distance communication, and storage medium
US12438883B2 (en)*2023-05-172025-10-07Microsoft Technology Licensing, LlcRegion-based security policies for cloud resources

Also Published As

Publication numberPublication date
CN107637011A (en)2018-01-26
CN107637011B (en)2021-11-02
EP3308497B1 (en)2019-08-28
EP3308497A1 (en)2018-04-18
EP3308497A4 (en)2018-12-26
WO2016200659A1 (en)2016-12-15
US10469464B2 (en)2019-11-05

Similar Documents

PublicationPublication DateTitle
US10469464B2 (en)Self-configuring key management system for an internet of things network
EP3308520B1 (en)System, apparatus and method for managing lifecycle of secure publish-subscribe system
US11736277B2 (en)Technologies for internet of things key management
US11477625B2 (en)System, apparatus and method for scalable internet of things (IoT) device on-boarding with quarantine capabilities
US11025627B2 (en)Scalable and secure resource isolation and sharing for IoT networks
US20160364553A1 (en)System, Apparatus And Method For Providing Protected Content In An Internet Of Things (IOT) Network
EP3308495B1 (en)System, apparatus and method for group key distribution for a network
CN107925567B (en)System, apparatus and method for optimizing symmetric key caching using tickets
US9998431B2 (en)System, apparatus and method for secure network bridging using a rendezvous service and multiple key distribution servers
CN109314705B (en)System, apparatus and method for large scale scalable dynamic multipoint virtual private network using group encryption keys
US20180176196A1 (en)System, apparatus and method for migrating a device having a platform group
US10355854B2 (en)Privacy preserving group formation with distributed content key generation
US20170272415A1 (en)System, Apparatus And Method For Key Provisioning Delegation
EP2741465B1 (en)Method and device for managing secure communications in dynamic network environments

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:INTEL CORPORATION, CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SMITH, NED M;REEL/FRAME:037289/0147

Effective date:20151203

ASAssignment

Owner name:INTEL CORPORATION, CALIFORNIA

Free format text:CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION NUMBERS 62172893 AND 62195409 PREVIOUSLY RECORDED AT REEL: 037289 FRAME: 0147. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:SMITH, NED M.;REEL/FRAME:037484/0473

Effective date:20151203

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPPInformation on status: patent application and granting procedure in general

Free format text:PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:4


[8]ページ先頭

©2009-2025 Movatter.jp